Cyber-Espionage News, Articles and Updates

WikiLeaks on Thursday dumped more leaked CIA documents with its latest Vault 7 disclosures, this time publishing materials from a tool suite called Brutal Kangaroo that allows attackers to indirectly infiltrate a closed network or air-gapped computer using a compromised flash drive.

One report suggests a possible computer server connection between the Trump organisation and a Russian bank, while another alleges that a Trump advisor was in contact with Russian hackers during the presidential election.

To combat alert fatigue among its security analysts, transportation service Uber applies specially customised data sets to flagged incidents to help distinguish between genuine threats and non-malicious activities.

An unknown actor whose targets and tactics resemble those of a Russian APT group has been compromising the websites of foreign embassies, ministries and organisations, in an attempt to infect certain site visitors with malware.

Following the arrests of four cyber experts in Russia on treason charges, conflicting theories have emerged, as observers speculate if the case is connected to the hacking of US political institutions in the run-up to the 2016 election.

Researchers may have found a tenuous link between a cyber-espionage organisation's credentials-stealing Trojan and the Shamoon hacking group that's been targeting Saudi energy companies with Disttrack disk-wiping malware.

Amidst a number of shocking revelations in relation to the Trump presidency, FireEye has released a report detailing some of the tools and tactics used by Russian hackers who are believed to be part of APT28 - a group of Russian state-back hackers - who are believed to be behind some of the year's headline grabbing hacks including the John Podesta emails, the WADA hack and the breach of the DNC during the election period.

SC Media UK arms cyber-security professionals with the in-depth, unbiased business and technical information they need to tackle the countless security challenges they face and establish risk management and compliance postures that underpin overall business strategies.